Data Quality: A Prerequisite for Succesful Data Warehouse Implementation

Size: px
Start display at page:

Download "Data Quality: A Prerequisite for Succesful Data Warehouse Implementation"

Transcription

1 Data Quality: A Prerequisite for Succesful Data Warehouse Implementation Viljan Mahnič and Igor Rozanc University of Ljubljana Faculty of Computer and Information Science 1 Introduction 1. The University of Ljubljana is the largest university in Slovenia. It consists of 26 member institutions (20 faculties, 3 academies, and 3 colleges) and has more than 40,000 students. In the past, the member institutions had substantial autonomy regarding the usage of information technologies, which led to uncoordinated development of their information systems. Different applications were developed for the same purpose and due to this heterogeneity it is very difficult or even impossible to create reports that require cross-referencing data from different institutions or application areas. In such a situation, the building of a data warehouse at the university level seems to be the most appropriate solution. Therefore, a pilot project started with the aim of defining a data model for a global data base which will be fed by data from member institutions on a regular basis and which will serve as a basis for analytical processing at the university level. One of the main tasks within this project is to define the granularity of data in the data warehouse and different levels of detail which will support best the decision making processes. However, experience from other organizations has shown that projects attempting to integrate data are especially vulnerable to data quality issues [1]. A recent study by the Standish Group states that 83 percent of data migration projects overrun their budget (or fail) primarily as a result of misunderstandings about the source data and data definitions. Similar surveys conducted by the Gartner Group point to data quality as a leading reason for overruns and failed projects [2]. In order to avoid such a pitfall, a thorough assessment of the quality of data that are used as input to the global data warehouse is necessary. Since we decided that our data warehouse will be populated gradually, starting with student data, the quality of these data was analyzed first. The aim of this paper is to describe in detail the assessment methodology and results obtained at two typical member institutions, viz. the Faculty of Computer and Information Science (FCIS), and the Faculty of Electrical Engineering (FEE). The assessment criteria were defined according to English s Total Quality data Management methodology [3]and Forino s recommendations [2]. A description of these criteria is given in Section 2, while the results of the assessment are presented in section 3. Section 4 describes the proposals for further activities, and section 5 summarizes the most important conclusions.

2 Data Quality: A Prerequisite for Succesful Data Warehouse Implementation Data Quality Assessment Methodology Data quality assurance is a complex problem that requires a systematic approach. English [3]proposes a comprehensive Total Quality data Management Methodology (TQdM), which consists of 5 processes of measuring and improving information quality, and an umbrella process for bringing about cultural and environmental changes to sustain information quality improvement as a management tool and a habit: Process 1: Assess Data Definition & Information Architecture Quality Process 2: Assess Information Quality Process 3: Measure Nonquality Information Costs Process 4: Reengineer and Cleanse Data Process 5: Improve Information Process Quality Process 6: Establish the Information Quality Environment Each process is further divided into steps that must be followed in order to achieve the desired data quality. Organizations embarking on data warehouse initiatives and that do not yet have an information quality function must conduct many of these steps, but may do so in a different sequence, based on their specific needs. Considering our specific needs, we concentrated on Process 2 which defines two aspects of information quality: the inherent information quality and the pragmatic information quality. Inherent information quality is the correctness or accuracy of data, while pragmatic information quality is the value that accurate data has in supporting the work of the enterprise. In this paper the results of inherent information quality assessment are described. In order to determine the quality of data a field-by-field assessment is required. However, simply having data is not enough, but the context for which the data is to exist must also be known. To put in other terms, a clear data definition or the so called meta data must be provided [2]. Generally speaking, one can find meta data in data models, data dictionaries, repositories, specifications, etc. If current meta data does not exist, then a subject matter expert is needed, and meta data is a much-desired by-product of a data quality assessment. The extent of assessment in great deal depends on the availability of meta data. According to [2], assessments usually focus on one or more of the following types of quality criteria: 1. Data type integrity 2. Business rule integrity 3. Name and address integrity If the assessment team knows nothing more than field names, types and sizes, then the focus is on testing the field s integrity based on it s type (numeric, alphanumeric, date, etc.). If additional characteristics of the field are provided (domain, relationship with other fields, etc.), then business rule integrity is also performed. Finally, if name and address data is critical (particularly if it will be consolidated with other data), then name and testing should be performed. On the other hand, English [3]defines the following inherent information quality characteristics and measures:

3 194 Viljan Mahnič and Igor Rozanc 1. Definition Conformance 2. Completeness (of values) 3. Validity, or business rule conformance 4. Accuracy to surrogate source 5. Accuracy (to reality) 6. Precision 7. Nonduplication (of occurrences) 8. Equivalence of redundant or distributed data 9. Concurrency of redundant or distributed data 10. Accessibility Considering the aforementioned quality characteristics and our specific needs we decided to measure the quality of our data using the following criteria: 1. Completeness of values: Users were encouraged to prioritize a subset of source fields that must have a nonnull value. For each field the percentage of with missing values was computed. 2. Validity, or business rule conformance: For a chosen subset of most important fields we measured the degree of conformance of data values to their domains and business rules. (a) All 1:N relationships were examined for existence of foreign keys in master tables. (b) Since time represents an important dimension in a dimensional data warehouse a range check was performed on all date fields in order to find possible out-of-range values. (c) A range check was performed on all other fields from the highest priority subset (e.g. academic year, year of study, grades etc.). (d) Special cross-checks were defined for fields having relationships with other fields that further define the allowable domain set, e.g. when a student applies for an exam for the first time (i.e. NO_OF_ATTEMPTS=1) the date of previous examination must be blank and vice versa the date of previous examination must be lesser than the date of next examination in each degree record the difference between the degree date and thesis issue date must be positive and less than six months. 3. Nonduplication of occurrences and equivalence of redundant and distributed data: In our case two different tests were performed: a) All files in the student database were checked for eventual duplications of primary keys. b) The student and employee files at both faculties were checked for the existence of the that are duplicate representations of the same student or employee respectively.

4 Data Quality: A Prerequisite for Succesful Data Warehouse Implementation Assessment Results 3.1 Completeness of values The most important fields in 33 files were checked for nonnull values, and it was found, that only few values were missing. Results are summarized in Table 1, while Tables 2 and 3 show the fields and files with most missing values for each faculty, respectively. The greatest problem represent the missing student_id values in alumni. This is a consequence of the fact that 15 years ago (when alumni started) some students were not assigned a student identification number. Faculty Table 1: Completeness of vaules (Summary Data) files checked attributes checked with missing values % of erroneous FCIS % FEE % TOTAL % Field name Table 2: Fields with most missing values (Faculty of Computer and Information Science) Field description File name Total no. % of erroneous of with missing values VPIS_ST student_id DIPLOMA % IME employee_first_namedelavec % Field name Table 3::Fields with most missing values (Faculty of Electrical Engineering) Field description File name Total no. % of erroneous of with missing values VPIS_ST student id DIPLOMA % IME_D employee_ DELAVEC % first_name DELAVEC employee_id VAJE %

5 196 Viljan Mahnič and Igor Rozanc 3.2 Validity, or business rule conformance Existence of foreign keys in master tables: The examination of all 1:N relationships revealed that in about a half percent of foreign keys do not have their counterpart values in the corresponding master tables (see Table 4). However, this average is misleadaing, since the majority of errors appear within a small number of relationships. The following relationships appeared to be the most problematic at both faculties (see Tables 5 and 6): 1. the relationship between entities DIPLOMA (student s degree thesis) and NACIN (a code table of possible types of study, e.g. full-time or part-time); 2. multiple relationships between entities STUD_F (student s personal data) and OBCINA (a code table of territorial units in Slovenia) representing the territorial unit of student s residence, place of birth, secondary school finished etc. The first of the aforementioned problems is simply a consequence of the fact that (within the alumni database) the faculties started collecting the type of study data in 1994, while this datum is missing in older. The second problem is much harder and was caused by significant changes in territorial organization at the local level in Slovenia after independence, which required several consequent modifications of the corresponding code table. Although each year s enrolment data corresponded to the currently valid version of the code table, there are a lot of inconstencies when we look at the data in time perspective. Faculty No. of files Table 4: Existence of foreign keys in master tables (Summary Data) checked relationships No. Of checked Relationships with with Er- Records Errors rors % of Relationships with Errors % of Records with Errors FCIS % % FE % % TOTAL % % Range checking of date fieldsdid not reveal any serious problems. In the worst case the rate of out-of-range field values reached % at FCIS, and 0.493% at FEE. Range checking of other fields from the highest priority subsetalso yielded quite good results. The filed IME_D (viz. employee s first name) was ranked the worst at both faculties containing % erroneous values at FCIS, and % erroneous values at FEE. Special cross-checks pointed out that the business rule requiring that each student completes his/her degree project in six months is sometimes violated. Namely, the difference between the degree date (datum zagovora) and thesis issue date (datum izstavitve teme) was more than six months in % of cases at FCIS, and in % of cases at FEE. Error rates reported by other cross-checking tests were less than 1 %.

6 Entity (File) Data Quality: A Prerequisite for Succesful Data Warehouse Implementation 197 Table 5: Problematic relationships (Faculty of Computer and Information Science) Foreign key field nonexistent values % of errors Name Description DIPLOMA 961 NACIN type of study code % STUD_F 4062 OBCINA_SS territorial unit code % of student s secondary school STUD_F 4062 OBCINA_R territorial unit code of student s place of birth STUD_F 4062 OBCINA_S territorial unit code of student s permanent residence STUD_F 4062 OBCINA_Z territorial unit code of student s temporary residence % % % 3.3 Nonduplication of occurrences and equivalence of redundant and distributed data Nonduplication of primary keys: The student information system at FCIS and FEE [4](as well as at other member institutions of the University of Ljubljana) is implemented using Clipper which does not automatically force the uniqueness of primary keys. In spite of the fact that all programs have been carefully written in order to avoid duplicates, some can be introduced through the manual maintenance of data, especially code tables. Therefore, all files in the student database were checked for eventual duplications of primary keys. An excerpt of assessment results showing only files with most duplicates is presented in tables 7 through 9. Table 7 shows the number of duplicated primary keys in code tables that are maintained centrally by the University computing center for all member institutions, while tables 8 and 9 refer to duplicates at FCIS and FEE respectively. A relatively high percentage of errors in some code tables indicates that the maintenance of code tables at the University computing center should be improved. Equivalence of redundant and distributed data: Given the fact that the some teachers teach at both faculties as well as that some students study at both faculties (e.g. a student can obtain his/her B. Sc. degree at FEE and enrols for graduate study at FCIS or vice versa) some data are replicated across faculties. In order to state the extent of such a replication two measures were introduced: the number of replicated entity occurrences (viz. the same teacher or student in both databases) with the same primary key, and the number of replicated entity with different primary keys. Assessment revealed that employee files at both faculties are consistent: all replicated employees have the same primary key. This is not the case with student files. Due to the decentralized organization of the University of Ljubljana each faculty assigns its students a different identification number regardless the fact that the student has already been enrolled

7 198 Viljan Mahnič and Igor Rozanc Entity (File) Table 6: Problematic relationships (Faculty of Electrical Engineering) Foreign key field nonexistent values % of errors Name Description DIPLOMA 2926 NACIN type of study code % STUD_F 8164 OBCINA_SS territorial unit code % of student s secondary school STUD_F 8164 OBCINA_R territorial unit code of student s place of birth STUD_F 8164 OBCINA_S territorial unit code of student s permanent residence STUD_F 8164 OBCINA_Z territorial unit code of student s temporary residence % % % Table 7: Nonduplication of primary keys (Code tables maintained by the University computing center) File duplicated primary keys % of errors VSI.DBF % SS_POKLI.DBF % CENTRI.DBF % ZAVOD.DBF % at another faculty. Unfortunately, these kind of inconsistencies may be a source of major problems when integrating data into a global warehouse. 4 Proposed Further Actions On the basis of assessment results we propose two kinds of further actions: cleansing of source data and an appropriate design of the global data warehouse at the university level. 1. Some erroneous source data can be cleansed automatically (e.g. missing type of study code in file DIPLOMA), while other data require manual or combined manual and automatic approach (e.g. removal of duplicated primary keys, re-establishment of relationships using territorial unit codes). Some errors (e.g. out-of-range values) can be prevented by the incorporation of appropriate controls in the program code. Special attention must be devoted to the maintenance of code tables that are common for the whole university. A relatively high percentage of duplicate codes in code tables, maintained by the university computing center up to now indicates that the maintenance of these code tables must improve.

8 Data Quality: A Prerequisite for Succesful Data Warehouse Implementation 199 Table 8: Nonduplication of primary keys (FCIS) File duplicated primary keys % of errors IZJEME.DBF % TEMA.DBF % DELAVEC.DBF % DVIG.DBF % Table 9: Nonduplication of primary keys (FEE) File duplicated primary keys % of errors SPP.DBF % PRED_PR.DBF % PP.DBF % DVIG.DBF % Additional problems could arise during the integration of those data and code tables that are at present maintained by individual departments (viz. employees, subjects taught, and students). Although our assessment did not reveal serious problems within each department, many duplications and code conflicts may occur during the integration. Therefore, we propose that a unique coding scheme for all employees, students, and subjects taught is defined in the first step of the data warehouse design. The data warehouse design must be based on principles of TQdM methodology. Data standards must be defined and data definition and information architecture quality assessment must take place before programming and population of the data warehouse begins. An ongoing data quality management process must be established and the roles and responsibilities of a data quality administrator, subject area champions, data oversight committee, and data owners clearly defined [4]. 5 Conclusions Our paper was intended to increase the awareness of the importance of data quality not only when building a data warehouse but also in operational environments that support transactional processing. An assessment methodology to empirically determine the data quality was described and the results of the assessment were presented. Table 10: Equivalence of redundant occurrences (FCIS and FEE) Entity (File) Description replications same primary key different primary key DELAVEC Employees STUDENT Students 4 121

9 200 Viljan Mahnič and Igor Rozanc 1. Considering the assessment results we estimate that source data at the Faculty of Computer and Information Science and Faculty of Electrical Engineering are good enough to be used as source for the global warehouse at the university level after some data cleansing takes place. In first place, missing student identification numbers must be provided in alumni and the broken relationships using territorial units codes must be re-established in students personal data. and the maintenance of common code tables at the University computing center must improve. During the design of the global data warehouse a special attention must be devoted to the integration of those data that may be replicated at many individual departments (viz. employees, subjects taught, and students). Since each department has its own policy of coding, many duplications and code conflicts may occur during the integration. Therefore, we propose that a unique coding scheme for all employees, students, and subjects taught is defined in the first step of the data warehouse design. Additionally, an ongoing data quality management process must be established and the roles and responsibilities of all personnel involved should be clearly defined. References [1] Celko, J., McDonald, J., Don t Warehouse Dirty Data, Datamation, October 15, 1995, pp [2] Farino, R., The Data Quality Assessment, Part 1, DM Review Online, August 2000, dmreview.com [3] English, L.P., Improving Data Warehouse and Business Information Quality, John Wiley & Sons, Inc., 1999, ISBN [4] Mahnič, V., Vilfan, B., Design of the Student Records Information System at the University of Ljubljana, Proceedings of the EUNIS 95 Congress, Düsseldorf, Germany, November 1995, pp [1] Kachur, R., Data Quality Assessment for Data Warehouse Design, DM Review Online, April 2000,

Characteristics of Students in the Cisco Networking Academy: Attributes, Abilities, and Aspirations

Characteristics of Students in the Cisco Networking Academy: Attributes, Abilities, and Aspirations Cisco Networking Academy Evaluation Project White Paper WP 05-02 October 2005 Characteristics of Students in the Cisco Networking Academy: Attributes, Abilities, and Aspirations Alan Dennis Semiral Oncu

More information

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post

More information

How Turner Broadcasting can avoid the Seven Deadly Sins That. Can Cause a Data Warehouse Project to Fail. Robert Milton Underwood, Jr.

How Turner Broadcasting can avoid the Seven Deadly Sins That. Can Cause a Data Warehouse Project to Fail. Robert Milton Underwood, Jr. How Turner Broadcasting can avoid the Seven Deadly Sins That Can Cause a Data Warehouse Project to Fail Robert Milton Underwood, Jr. 2000 Robert Milton Underwood, Jr. Page 2 2000 Table of Contents Section

More information

Master & Doctor of Philosophy Programs in Computer Science

Master & Doctor of Philosophy Programs in Computer Science Master & Doctor of Philosophy Programs in Computer Science Research Fields Pattern Recognition Data Analysis Internet of Things and Network Communication Machine Learning Web Semantic and Ontology For

More information

Schedule User Guide PowerSchool Student Information System

Schedule User Guide PowerSchool Student Information System PowerSchool Student Information System Document Properties Schedule User Guide Copyright Owner 2004 Apple Computer, Inc. All rights reserved. This document is the property of Apple Computer, Inc. and is

More information

GLEIF Global LEI Data Quality Report Dictionary

GLEIF Global LEI Data Quality Report Dictionary GLEIF Global LEI Data Quality Report Dictionary Global LEI Data Quality Report Dictionary 2 19 Contents Data Quality Report Glossary... 3 1. Chapter 1: Preface... 4 1.1. Purpose of the Data Quality Report...

More information

QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM

QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM DEPARTMENT OF CONSTRUCTION MANAGEMENT AND CIVIL AND CONSTRUCTION ENGINEERING QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM Updated 5/17 Organization The QIP consists of

More information

CS211 Lecture: Database Design

CS211 Lecture: Database Design CS211 Lecture: Database Design Objectives: last revised November 21, 2006 1. To introduce the anomalies that result from redundant storage of data 2. To introduce the notion of functional dependencies

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager The objective of the PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager examination is to ensure

More information

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS July 2015 212001734.08 Contents 1. CORE STANDARDS FOR PLT COURSES 1 1.1 Fundamental requirement 1 1.2 Course objectives 1 1.3 Course content 1 1.4 Teaching

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified Management System Auditor www.pecb.com The objective of the PECB Certified Management System Auditor examination is to ensure that the candidates

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27005 Risk Manager www.pecb.com The objective of the PECB Certified ISO/IEC 27005 Risk Manager examination is to ensure that the candidate

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has

More information

AUDIT UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY. Report No Issue Date: 8 January 2014

AUDIT UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY. Report No Issue Date: 8 January 2014 UNITED NATIONS DEVELOPMENT PROGRAMME AUDIT OF UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY Report No. 1173 Issue Date: 8 January 2014 Table of Contents Executive Summary

More information

Designing Data Warehouses. Data Warehousing Design. Designing Data Warehouses. Designing Data Warehouses

Designing Data Warehouses. Data Warehousing Design. Designing Data Warehouses. Designing Data Warehouses Designing Data Warehouses To begin a data warehouse project, need to find answers for questions such as: Data Warehousing Design Which user requirements are most important and which data should be considered

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate

More information

COURSE OUTLINE. School of Engineering Technology and Applied Science

COURSE OUTLINE. School of Engineering Technology and Applied Science COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: PROGRAM: COURSE TITLE: Information and Communication Engineering Technology (ICET) Computer and Communication Networking

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27002 Manager www.pecb.com The objective of the PECB Certified ISO/IEC 27002 Manager examination is to ensure that the candidate has

More information

CHAPTER 3 Implementation of Data warehouse in Data Mining

CHAPTER 3 Implementation of Data warehouse in Data Mining CHAPTER 3 Implementation of Data warehouse in Data Mining 3.1 Introduction to Data Warehousing A data warehouse is storage of convenient, consistent, complete and consolidated data, which is collected

More information

The Six Principles of BW Data Validation

The Six Principles of BW Data Validation The Problem The Six Principles of BW Data Validation Users do not trust the data in your BW system. The Cause By their nature, data warehouses store large volumes of data. For analytical purposes, the

More information

CUSTOMER DATA INTEGRATION (CDI): PROJECTS IN OPERATIONAL ENVIRONMENTS (Practice-Oriented)

CUSTOMER DATA INTEGRATION (CDI): PROJECTS IN OPERATIONAL ENVIRONMENTS (Practice-Oriented) CUSTOMER DATA INTEGRATION (CDI): PROJECTS IN OPERATIONAL ENVIRONMENTS (Practice-Oriented) Flávio de Almeida Pires Assesso Engenharia de Sistemas Ltda flavio@assesso.com.br Abstract. To counter the results

More information

COURSE OUTLINE PRE-REQUISITES/CO-REQUISITES: COMP228, COMP214 COURSE ELIGIBILITY FOR PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR):

COURSE OUTLINE PRE-REQUISITES/CO-REQUISITES: COMP228, COMP214 COURSE ELIGIBILITY FOR PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR): COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: PROGRAM: COURSE TITLE: Information and Communication Engineering Technology (ICET) Software Engineering Technology

More information

Update: IQ Certification Program UALR/IAIDQ

Update: IQ Certification Program UALR/IAIDQ Update: IQ Certification Program UALR/IAIDQ BIOGRAPHY John R. Talburt Professor of Information Science Acxiom Chair of Information Quality University of Arkansas at Little Rock Dr. John R. Talburt is Professor

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Implementer www.pecb.com The objective of the PECB Certified ISO 14001 Lead Implementer examination is to ensure that the candidate

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27005 Risk Manager The objective of the Certified ISO/IEC 27005 Risk Manager examination is to ensure that the candidate has the knowledge and the skills to

More information

DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK)

DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) Release 2.2 August 2013. This document was created in collaboration of the leading experts and educators in the field and members of the Certified Data Steward

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 14001 Lead Auditor examination is to ensure that the candidate

More information

Management Information Systems

Management Information Systems Foundations of Business Intelligence: Databases and Information Management Lecturer: Richard Boateng, PhD. Lecturer in Information Systems, University of Ghana Business School Executive Director, PearlRichards

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 21500 Lead Project Manager The objective of the PECB Certified ISO 21500 Lead Project Manager examination is to ensure that the candidate has the knowledge and

More information

Part 9: More Design Techniques

Part 9: More Design Techniques 9. More Design Techniques 9-1 Part 9: More Design Techniques References: Batini/Ceri/Navathe: Conceptual Database Design. Benjamin/Cummings, 1992. Elmasri/Navathe: Fundamentals of Database Systems, 3rd

More information

Managing Data Resources

Managing Data Resources Chapter 7 Managing Data Resources 7.1 2006 by Prentice Hall OBJECTIVES Describe basic file organization concepts and the problems of managing data resources in a traditional file environment Describe how

More information

MSc in Information Systems

MSc in Information Systems MSc in Information Systems Assoc Prof Dion Goh Programme Director WKWSCI 26 October 2018 Programme Objective To educate information systems professionals who are able to develop and manage user-centered

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified OHSAS 18001 Lead Auditor www.pecb.com The objective of the PECB Certified OHSAS 18001 Lead Auditor examination is to ensure that the candidate

More information

Objectives of the Security Policy Project for the University of Cyprus

Objectives of the Security Policy Project for the University of Cyprus Objectives of the Security Policy Project for the University of Cyprus 1. Introduction 1.1. Objective The University of Cyprus intends to upgrade its Internet/Intranet security architecture. The University

More information

Managing Data Resources

Managing Data Resources Chapter 7 OBJECTIVES Describe basic file organization concepts and the problems of managing data resources in a traditional file environment Managing Data Resources Describe how a database management system

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 37001 Lead Auditor www.pecb.com The objective of the Certified ISO 37001 Lead Auditor examination is to ensure that the candidate possesses

More information

Bridgewater State University Website Policy

Bridgewater State University Website Policy Bridgewater State University Website Policy The initial development and ongoing maintenance and updating of the Bridgewater State University Website represent an extensive undertaking and major investment

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27001 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 27001 Lead Auditor examination is to ensure that the candidate

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

EVALUATION OF THE USABILITY OF EDUCATIONAL WEB MEDIA: A CASE STUDY OF GROU.PS

EVALUATION OF THE USABILITY OF EDUCATIONAL WEB MEDIA: A CASE STUDY OF GROU.PS EVALUATION OF THE USABILITY OF EDUCATIONAL WEB MEDIA: A CASE STUDY OF GROU.PS Turgay Baş, Hakan Tüzün Hacettepe University (TURKEY) turgaybas@hacettepe.edu.tr, htuzun@hacettepe.edu.tr Abstract In this

More information

BCS Practitioner Certificate in Information Risk Management Syllabus

BCS Practitioner Certificate in Information Risk Management Syllabus BCS Practitioner Certificate in Information Risk Management Syllabus Version 6.5 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales,

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

Data Management Glossary

Data Management Glossary Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative

More information

Centralized Directory Services and Accounts Management Project

Centralized Directory Services and Accounts Management Project Centralized Directory Services and Accounts Management Project Rob Murawski University of Pittsburgh Computing Services & Systems Development 717 Cathedral of Learning Pittsburgh, PA 15260 (412) 383-9637

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

Helping shape your future

Helping shape your future www.pwc.com/pwcacademyme Helping shape your future Project Management Professional (PMP ) PwC s Academy 2016-2017 Contents Welcome to PwC s Academy 1 About Project Management Professional (PMP ) 2 Getting

More information

Full file at

Full file at Chapter 2 Data Warehousing True-False Questions 1. A real-time, enterprise-level data warehouse combined with a strategy for its use in decision support can leverage data to provide massive financial benefits

More information

How to apply online

How to apply online How to apply online https://eprihlaska.tuke.sk - 1 - CONTENTS 1. REGISTRATION... 3 2. LOGIN... 5 3. REGISTRATION OF PERSONAL INFORMATION... 6 1. Basic data... 6 2. Name data... 7 3. Personal data... 8

More information

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:

More information

NFPA Edition

NFPA Edition NFPA 1035-2015 Edition Prerequisite Public Fire and Safety Educator I A completed application and payment plan are required one week before taking the Public Fire Life Safety Educator II Certification

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27002 Manager The objective of the PECB Certified ISO/IEC 27002 Manager examination is to ensure that the candidate has the knowledge for implementing information

More information

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives

More information

Database Management Systems MIT Lesson 01 - Introduction By S. Sabraz Nawaz

Database Management Systems MIT Lesson 01 - Introduction By S. Sabraz Nawaz Database Management Systems MIT 22033 Lesson 01 - Introduction By S. Sabraz Nawaz Introduction A database management system (DBMS) is a software package designed to create and maintain databases (examples?)

More information

The IDN Variant TLD Program: Updated Program Plan 23 August 2012

The IDN Variant TLD Program: Updated Program Plan 23 August 2012 The IDN Variant TLD Program: Updated Program Plan 23 August 2012 Table of Contents Project Background... 2 The IDN Variant TLD Program... 2 Revised Program Plan, Projects and Timeline:... 3 Communication

More information

Instructions for using a fillable PDF form

Instructions for using a fillable PDF form Fall 2015 Admission Doctor of Philosophy Faculty of Social Work University of Calgary Telephone: (403) 220-5942 Instructions for using a fillable PDF form Software for using fillable forms Adobe Acrobat

More information

Summary of Gartner COMPARE Survey of HIPAA Readiness Conducted Feb-March 2003

Summary of Gartner COMPARE Survey of HIPAA Readiness Conducted Feb-March 2003 Summary of Gartner COMPARE Survey of HIPAA Readiness Conducted Feb-March 2003 Presentation to HIPAA Summit West 6 June 2003 Vice-President, Research Area Director Gartner Page 0 Definition: Gartner s Compliance

More information

Normalizing repository tables with the Normalization wizard

Normalizing repository tables with the Normalization wizard Normalizing repository tables with the Normalization wizard Author: R&D Department Publication date: December 8, 2008 Revision date: December 2010 2010 Consyst SQL Inc. All rights reserved. Normalizing

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22301 Lead Implementer www.pecb.com The objective of the Certified ISO 22301 Lead Implementer examination is to ensure that the candidate

More information

HIPAA RISK ADVISOR SAMPLE REPORT

HIPAA RISK ADVISOR SAMPLE REPORT HIPAA RISK ADVISOR SAMPLE REPORT HIPAA Security Analysis Report The most tangible part of any annual security risk assessment is the final report of findings and recommendations. It s important to have

More information

CURRICULUM MASTER OF DISASTER MANAGEMENT

CURRICULUM MASTER OF DISASTER MANAGEMENT CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered

More information

Chapter 6. Foundations of Business Intelligence: Databases and Information Management VIDEO CASES

Chapter 6. Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:

More information

Introduction Database Technology [DBTECO601]

Introduction Database Technology [DBTECO601] Introduction Database Technology [DBTECO601] Thomas D. Devine http://www.noucamp.org thomas.devine@lyit.ie September 8, 2008 1 Contents 1 Document Information 4 2 Introduction 4 3 Traditional File-Based

More information

FERC Reliability Technical Conference -- Panel I State of Reliability and Emerging Issues

FERC Reliability Technical Conference -- Panel I State of Reliability and Emerging Issues -- State of Reliability and Emerging Issues Remarks of Thomas Burgess, Vice President and Director, Reliability Assessment and Performance Analysis Chairman Wellinghoff, Commissioners, Staff, and fellow

More information

Data Warehousing. Overview

Data Warehousing. Overview Data Warehousing Overview Basic Definitions Normalization Entity Relationship Diagrams (ERDs) Normal Forms Many to Many relationships Warehouse Considerations Dimension Tables Fact Tables Star Schema Snowflake

More information

Data warehouse architecture consists of the following interconnected layers:

Data warehouse architecture consists of the following interconnected layers: Architecture, in the Data warehousing world, is the concept and design of the data base and technologies that are used to load the data. A good architecture will enable scalability, high performance and

More information

CPA Exam and Licensure Information and FAQs

CPA Exam and Licensure Information and FAQs CPA Exam and Licensure Information and FAQs 1 CPA Exam and Licensure Information and FAQs July 2016 Dr. Gary Colbert, Director of Accounting Programs, University of Colorado Denver 1 Education and experience

More information

SQL Server 2008 Consolidation

SQL Server 2008 Consolidation Technology Concepts and Business Considerations Abstract The white paper describes how SQL Server 2008 consolidation provides solutions to basic business problems pertaining to the usage of multiple SQL

More information

UCSB IT Forum. April 15, 2014

UCSB IT Forum. April 15, 2014 UCSB IT Forum April 15, 2014 Agenda 1. Announcements 2. IT Governance a. Enterprise IT Governance Overview b. History of Campus IT Governance c. New Approach 3. Discussion ANNOUNCEMENTS IT Needs Assessment

More information

Web Site Guidelines. University of Texas at El Paso. Prepared by: The Office of Information Resources and Planning. November 16, 2004.

Web Site Guidelines. University of Texas at El Paso. Prepared by: The Office of Information Resources and Planning. November 16, 2004. Web Site Guidelines University of Texas at El Paso Prepared by: The Office of Information Resources and Planning November 16, 2004 Page 1 of 24 REVISION HISTORY Revision Code Revision Date Comments - 11/16/2004

More information

INFS 2150 (Section A) Fall 2018

INFS 2150 (Section A) Fall 2018 INFS 2150 (Section A) Fall 2018 Introduction to Web Development Class meets TUE & THU: 12:30am-1:45pm: in Wheatley 114 Instructor: Peter Y. Wu Office: Wheatley 309 Office Hours: Tuesday 9:00 am-12:00 noon;

More information

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System EVALUATION AND APPROVAL OF AUDITORS Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System 1 TABLE OF CONTENTS 1. Scope and field of Application 3 2. Normative

More information

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying What you need to know to become a Certified EDUCATOR in Florida General Certification Requirements for Individuals Applying for Initial Certification Beginning July 1, 2002 Bureau of Educator Certification

More information

MIT Database Management Systems Lesson 01: Introduction

MIT Database Management Systems Lesson 01: Introduction MIT 22033 Database Management Systems Lesson 01: Introduction By S. Sabraz Nawaz Senior Lecturer in MIT, FMC, SEUSL Learning Outcomes At the end of the module the student will be able to: Describe the

More information

Emergency Cooling Centres

Emergency Cooling Centres 53 Emergency Cooling Centres To: Financial Budget and Enrolment Committee Date: 09 May 2018 Report No.: 05-18-3388 Strategic Directions Make every school an effective school Recommendation It is recommended

More information

Usability Services at the University of Maryland: Who, What and How

Usability Services at the University of Maryland: Who, What and How Usability Services at the University of Maryland: Who, What and How Gina M. Jones University of Maryland Coordinator, Web Services Office of Information Technology gj35@umail.umd.edu ABSTRACT Web Services,

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 39001 Lead Auditor The objective of the PECB Certified ISO 39001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

Threat Centric Vulnerability Management

Threat Centric Vulnerability Management Threat Centric Vulnerability Management Solution Brief When it comes to vulnerability management, security leaders continue struggle to identify which of the thousands even millions of vulnerabilities

More information

BSc (Honours) Computer Science Curriculum Outline

BSc (Honours) Computer Science Curriculum Outline BSc (Honours) Computer Science Curriculum Outline 1. Introduction: The economic and strategic importance provided by Computer Science and Information Technology is increasing daily. This importance is

More information

STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET

STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET PAGE 1 ORGANIZATIONS THAT MAKE A GREATER COMMITMENT TO VIRTUALIZING THEIR OPERATIONS GAIN GREATER EFFICIENCIES. PAGE 2 SURVEY TOPLINE

More information

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy. Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate

More information

COURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems and Networks Technology (CSNT) PRE-REQUISITES/CO-REQUISITES:

COURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems and Networks Technology (CSNT) PRE-REQUISITES/CO-REQUISITES: COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: Information and Communication Engineering Technology (ICET) PROGRAM: COURSE TITLE: Computer Systems and Networks

More information

The Impact of Information System Risk Management on the Frequency and Intensity of Security Incidents Original Scientific Paper

The Impact of Information System Risk Management on the Frequency and Intensity of Security Incidents Original Scientific Paper The Impact of Information System Risk Management on the Frequency and Intensity of Security Incidents Original Scientific Paper Hrvoje Očevčić Addiko Bank d.d. Slavonska avenija 6, Zagreb, Croatia hrvoje.ocevcic@gmail.com

More information

This document was provided by Sheryl Moulden from Skyward on April 22, 2009.

This document was provided by Sheryl Moulden from Skyward on April 22, 2009. This document was provided by Sheryl Moulden from Skyward on April 22, 2009. Advanced Master Schedule Builder Introduction Setup Utilities Master Schedule Builder Introduction The Advance Master Schedule

More information

Academic Program Plan for Assessment of Student Learning Outcomes The University of New Mexico

Academic Program Plan for Assessment of Student Learning Outcomes The University of New Mexico Academic Program Plan for Assessment of Student Learning Outcomes The Mexico A. College, Department and Date 1. College: School of Engineering 2. Department: Department of Civil Engineering 3. Date: February

More information

Chapter 6 VIDEO CASES

Chapter 6 VIDEO CASES Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 17025 Lead Auditor The objective of the PECB Certified ISO/IEC 17025 Lead Auditor examination is to ensure that the candidate possesses the needed expertise

More information

PECT Test Development Process and Test Preparation. May 2013

PECT Test Development Process and Test Preparation. May 2013 PECT Test Development Process and Test Preparation May 2013 Program Background In May 2007, the Pennsylvania State Board of Education approved an amended version of Chapter 49-2. The amended regulations:

More information

Reliability Standards Development Plan

Reliability Standards Development Plan Reliability Standards Development Plan Steven Noess, Director of Standards Development Standards Oversight and Technology Committee Meeting November 1, 2016 2017-2019 Reliability Standards Development

More information

2014 Web Accessibility Survey

2014 Web Accessibility Survey 2014 Web Accessibility Survey This survey Replaces the 2006 reporting requirements for web accessibility; Was developed by IBHE Web Accessibility Consortium and endorsed by Disabilities Advisory Committee;

More information

IT Accessibility

IT Accessibility Objective: The University of Tennessee (UT) strives to deploy information, materials, and technology that have been designed, developed, or procured to be accessible to individuals with disabilities, including

More information

Please read all information and instructions before completing the application form.

Please read all information and instructions before completing the application form. Dear International CNT Applicant, Thank you for your interest in the Clean Needle Technique (CNT) course, administered by the Council of Colleges of Acupuncture and Oriental Medicine (CCAOM). Successful

More information

THE REAL ROOT CAUSES OF BREACHES. Security and IT Pros at Odds Over AppSec

THE REAL ROOT CAUSES OF BREACHES. Security and IT Pros at Odds Over AppSec THE REAL ROOT CAUSES OF BREACHES Security and IT Pros at Odds Over AppSec EXECUTIVE SUMMARY Breaches still happen, even with today s intense focus on security. According to Verizon s 2016 Data Breach Investigation

More information

CHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l "?J Approved,G. 'S u,\? Approved. Approved

CHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l ?J Approved,G. 'S u,\? Approved. Approved 2013-2014 LONG SIGNATURE SHEET Proposal Number: SIS 10-07-13 _ ~f/; UNC CHARIDITE Proposal Title: Establish a graduate level course: Cloud Data Storage.:1T1.5 6' ~ 7AJ "1-11$ 8')(.0 Originating Department:

More information

2005 University of California Undergraduate Experience Survey

2005 University of California Undergraduate Experience Survey 2005 University of California Undergraduate Experience Survey This year's survey has three parts: I. Time use and overall satisfaction II. Your background III. Rotating modules PART I: TIME USE and OVERALL

More information

Digital Communication and Aesthetics,

Digital Communication and Aesthetics, Curriculum for the Elective Study at Bachelor Level in Digital Communication and Aesthetics, 2016 Corrected 2017 Amended 2018 Department of Media, Cognition and Communication Faculty of Humanities University

More information

Chapter 3. Foundations of Business Intelligence: Databases and Information Management

Chapter 3. Foundations of Business Intelligence: Databases and Information Management Chapter 3 Foundations of Business Intelligence: Databases and Information Management THE DATA HIERARCHY TRADITIONAL FILE PROCESSING Organizing Data in a Traditional File Environment Problems with the traditional

More information